Multiple stack-based buffer overflows in W3C Amaya Web Browser 10.0 and 11.0 allow remote malicious users to execute arbitrary code via (1) a long type parameter in an input tag, which is not properly handled by the EndOfXmlAttributeValue function; (2) an "HTML GI" in a start tag, which is not properly handled by the ProcessStartGI function; and unspecified vectors in (3) html2thot.c and (4) xml2thot.c, related to the msgBuffer variable. NOTE: these are different vectors than CVE-2008-6005.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
w3 amaya |
||
w3 amaya 9.55 |
||
w3 amaya 9.4 |
||
w3 amaya 8.8.4 |
||
w3 amaya 9.0 |
||
w3 amaya 8.7 |
||
w3 amaya 8.1a |
||
w3 amaya 8.1 |
||
w3 amaya 6.2 |
||
w3 amaya 9.52 |
||
w3 amaya 8.52 |
||
w3 amaya 9.2.1 |
||
w3 amaya 9.1 |
||
w3 amaya 8.4 |
||
w3 amaya 8.3 |
||
w3 amaya 7.1 |
||
w3 amaya 7.0 |
||
w3 amaya 5.1 |
||
w3 amaya 5.0 |
||
w3 amaya 4.0 |
||
w3 amaya 3.2.1 |
||
w3 amaya 2.1 |
||
w3 amaya 2.0 |
||
w3 amaya 1.1c |
||
w3 amaya 1.1 |
||
w3 amaya 10.0 |
||
w3 amaya 9.5 |
||
w3 amaya 8.8.5 |
||
w3 amaya 8.7.2 |
||
w3 amaya 8.7.1 |
||
w3 amaya 8.2 |
||
w3 amaya 8.1b |
||
w3 amaya 6.4 |
||
w3 amaya 6.3 |
||
w3 amaya 4.3.2 |
||
w3 amaya 4.3.1 |
||
w3 amaya 3.2 |
||
w3 amaya 3.1 |
||
w3 amaya 1.4 |
||
w3 amaya 1.4a |
||
w3 amaya 1.3b |
||
w3 amaya 1.1a |
||
w3 amaya 1.0 |
||
w3 amaya 6.1 |
||
w3 amaya 6.0 |
||
w3 amaya 4.3 |
||
w3 amaya 4.2.1 |
||
w3 amaya 3.0 |
||
w3 amaya 2.4 |
||
w3 amaya 1.3a |
||
w3 amaya 1.3 |
||
w3 amaya 1.0a |
||
w3 amaya 0.95b |
||
w3 amaya 9.54 |
||
w3 amaya 9.53 |
||
w3 amaya 9.3 |
||
w3 amaya 8.8.3 |
||
w3 amaya 8.8.1 |
||
w3 amaya 8.6 |
||
w3 amaya 8.5 |
||
w3 amaya 8.0 |
||
w3 amaya 7.2 |
||
w3 amaya 5.3 |
||
w3 amaya 5.2 |
||
w3 amaya 4.2 |
||
w3 amaya 4.1 |
||
w3 amaya 2.3 |
||
w3 amaya 2.2 |
||
w3 amaya 1.2a |
||
w3 amaya 1.2 |
||
w3 amaya 0.9 |